Archive

In order to get an understanding of Computer Security it is necessary to break it down into smaller composite parts [i.e. to break it down into it’s founding principles]. From the class lecture we saw CIA [Confidentiality, Integrity and Availability] are the necessary components that compose a secure system.
Confidentiality: The ability to ensure that data/information that is intended to be private/secret remains [is maintained] that way. This could be paraphrased to as data/information should only be made accessible to those entities who legally have the rights to do so.
Integrity: Data/Information is only modified by those entities who should be able to do so.
Availability: Data/ Information/ Resources should be available to the respective consumer entities at all times [whenever they are required].

Sometimes, some additions to these 3 criteria are discussed. The following are some of these:
a). Non-repudiation
b). Authenticity

Even though one may think that this is the only way of breaking computer security down, there are other models…[to be continued…]

[Update: 28th Sept – So far I haven’t come across any other ways of breaking down IT Security into it’s constituent parts, so if you do come across another, please point me in that direction]